• Title/Summary/Keyword: Legacy Systems

Search Result 338, Processing Time 0.029 seconds

A Practical Study on Code Static Analysis through Open Source based Tool Chains (Open Source 기반 툴 체인화를 통한 코드 정적 분석 연구)

  • Kang, Geon-Hee;Kim, R. Young Chul;Yi, Geun Sang;Kim, Young Soo;Park, Yong. B.;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.148-153
    • /
    • 2015
  • In our domestic software industries, it is focused on such a high quality development/ testing process, maturity measurement, and so on. But the real industrial fields are still working on a code-centric development. Most of the existing legacy systems did not keep the design and highly increased the code complexity with more patching of the original codes. To solve this problem, we adopt a code visualization technique which is important to reduce the code complexity among modules. To do this, we suggest a tool chaining method based on the existing open source software tools, which extends NIPA's Software Visualization techniques applied to procedural languages. In addition, it should be refactored to fix bad couplings of the quality measurement indicators within the code visualization. As a result, we can apply reverse engineering to the legacy code, that is, from programming via model to architecture, and then make high quality software with this approach.

Institutional Constraints and Actors' Choice in Government Examination System (정부 회계검사 제도의 제도적 제약과 행위자의 선택)

  • Lim, Dong-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.193-203
    • /
    • 2015
  • This study aims to analyze why South Korea has not used audit system but examination system and suggest policy reform for the system on the institutional context perspective. Institutional context is structured down to institutional legacy, motives, institutional constraints, actors' roles, and changed institution. I researched the literature on the subject and collected research materials from the Department of the Treasury and Audit Office website of New Zealand, Australia, United Kingdom, United States and South Korea. These were analyzed using for suggesting realistic and effective policy. Analysis showed that South Korea has used examination system due to institutional constraints and tried to increase reliability of financial statements by enlarging the meaning of examination, strengthening the ability of the Board of Audit and Inspection, enacting government examination standards, and making a comprehensive public announcement. Comparing with other countries where government audit systems are applied, there are still some vulnerable points in South Korea. In order to make up for the shortcomings, this study suggests several points: strengthening the ability of actors; systemizing internal control; expressing opinion; making a more comprehensive public announcement. It would be desirable for making further detailed studies of the points.

Assessment of Interoperability Between Touchless and Legacy Rolled Fingerprints (비접촉식 지문의 날인 지문과의 호환성 평가 연구)

  • Choi, Hee-Seung;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.1
    • /
    • pp.149-156
    • /
    • 2011
  • The purpose of this paper is the brief introduction of touchless fingerprint recognition and the assessment of interoperability between touchless and legacy rolled fingerprints for the wide use of touchless fingerprint recognition system. In order to assess the interoperability, the contrast and resolution of the touchless images are optimized firstly. And we perform the matching by using conventional minutiae-based matcher. Experimental results are promising that our touchless fingerprints have enough matching performance with equal error rate 7.9%. We can expect that our paper will make a significant contribution to the wide use of touchless fingerprint recognition and the increment of interoperability in the system integration between touchless-based and touch-based fingerprint systems.

A Study on the Possibility of Transforming to Digital Substations using IEC 61850 Field Information Processing Panel of Legacy Substation (기존 변전소의 IEC 61850 기반 현장정보처리반을 이용한 디지털변전소 전환 가능성 검토에 관한 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.129-136
    • /
    • 2018
  • The IEC 61850 communication standard is used worldwide, and within the country the new substation is built as a digital substation based on IEC 61850 from 2013, after field tests and R&D from 2007. Research on the development of digital substation operating system has been conducted mainly in large domestic companies, so the IED power application equipment for LCP are developed. However, there is still a lack of research in the field of systems that can accommodate all the field devices used for legacy substation and new digital substation. In this paper, we developed the 48VDC input modules and the 125VDC output modules which can construct proposed field information processing modules to IEC 61850 based type, and verified the field applicability from the state monitoring and control operation tests by using IEC 61850 client authentication program and Wireshark.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

Study QoS algorithms For ethernet traffic handling performance On MOST 150 Gateway (MOST150 Gateway의 Ethernet 트래픽 처리 성능 향상을 위한 QoS 알고리즘에 관한 연구)

  • Kim, Chang-young;Jang, Jong-wook;Yu, Yun-sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.780-783
    • /
    • 2009
  • The application of MOST150 technology has been required to satisfy the demand for the automotive infotainment system and the higher bandwidth requirements caused by the increase of the multimedia processing capacity. The Ethernet technology applied gateway was implemented for an efficient transmission of multimedia, a vehicle diagnosis, an external communication, a data processing between the MOST150 and the CAN communication method applied to many existing vehicles. The new algorithm and application were suggested in order to efficiently perform the data processing between other types of communication systems. The existing MOST150 frame is mainly composed of the Control Channel, the Legacy Packet Channel(async) and the Synchronous /Isochronous Channels and performs the data processing through these sequential channels. With the sense of this process, this study suggested the new algorithm that the Mapping method of the IETF's QoS Management was applied to the MOST150 technology for the efficient QoS.

  • PDF

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.

Component-Based Systematic Reengineering Process (컴포넌트 기반의 체계적인 재공학 프로세스)

  • Cha Jung-Jun;Kim Chul Hong;Yang Young-Jong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.947-956
    • /
    • 2005
  • Software(S/W) reengineering is one of the effective technologies to produce a business worth and en and the S/W ROI continuously. In spite of, S/W reengineering has been recognized a cost-consumptive works with inefficient productivity. In fact we have used to transform to confusion system with destructive system architecture by extending and updating legacy system in a temporary expedients. Moreover it is impossible to provide the time-market products for coping with rapid changeable system environment and meeting to complicated customer's requirements. Therefore, we need a systematic reengineering methodology to fulfill the changeable environment, as appearance of new IT techniques, various alteration of business information model, and increment of business logic. Legacy systems can be utilized as the core property in business organization through reengineering methodology. In this paper, we target to establish the reengineering process, proposed MaRMI-RE consisting of initial Planning phase, reverse engineering and component transformation phase. To describe the MaRMI-RE, we presented the concrete tasks and techniques and artifacts per individual phase in process, and the case study is showed briefly.

Design and Implementation of the Higher-quality Terrestrial 3DTV Broadcasting Standard Specification Based on Synchronization with Non-Real-Time Contents (고화질 스테레오스코픽 영상 서비스를 위한 비실시간 콘텐츠 연동 지상파 3DTV 방송 표준규격 설계 및 검증)

  • Lee, Jangwon;Kim, Kyuheon;Yim, Hyun-Jeong;Cheong, Won-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1185-1194
    • /
    • 2012
  • This paper proposes a new terrestrial 3DTV broadcasting standard specification based on synchronization with non-real-time contents in order to overcome quality limitations of the current 3DTV services that are arisen from the limited bandwidth of the legacy broadcasting channel. In the services using the proposed specification, one view sequence of a stereoscopic video content is delivered as a non-real-time content in idle time, and the other view sequence is transmitted in real time broadcasting signal, thereafter two sequences are synchronized in a receiver for display. Thus, it is possible to provide higher-quality stereoscopic video content services than the current 3DTV services. In order to realize these services, a new mechanism is required which enables synchronization between the data that are from different transmission media and time. Therefore, this paper suggests a solution by multiplexing the synchronization signals of non-real-time contents into broadcasting signals with real-time streams together. This solution can provide a accurate synchronization mechanism by minimum updates of legacy broadcasting systems while maintaining compatibility with legacy services.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF